SystemsSec 2016W Lecture 11: Difference between revisions
No edit summary |
Willforrest (talk | contribs) |
||
Line 5: | Line 5: | ||
* To what extent are security tools (for attack and defense) hard to use? Are these difficulties inherent to the technology or are other factors in play? Give examples from your personal experience. | * To what extent are security tools (for attack and defense) hard to use? Are these difficulties inherent to the technology or are other factors in play? Give examples from your personal experience. | ||
* Describe three threat models and explain what entities these threat models apply to. | * Describe three threat models and explain what entities these threat models apply to. | ||
==Midterm Layout== | |||
*Expect each question to be a small essay, that draws upon the information acquired through class, and through the readings to form a conclusion. | |||
*Expect 3-5 questions on the midterm. | |||
*This exam will be closed book. Email Anil if writing this midterm via computer is important to you. |
Revision as of 15:28, 11 February 2016
Sample Midterm Questions
- What properties should a secure OS have? Why?
- Why are production operating systems not constructed like ones designed for security first? Be specific
- To what extent are security tools (for attack and defense) hard to use? Are these difficulties inherent to the technology or are other factors in play? Give examples from your personal experience.
- Describe three threat models and explain what entities these threat models apply to.
Midterm Layout
- Expect each question to be a small essay, that draws upon the information acquired through class, and through the readings to form a conclusion.
- Expect 3-5 questions on the midterm.
- This exam will be closed book. Email Anil if writing this midterm via computer is important to you.